Page 5 of 148 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

06 Oct 2022 — It was possible to trigger an infinite recursion condition in the error handler when Hermes executed specific maliciously formed JavaScript. This condition was only possible to trigger in dev-mode (when asserts were enabled). This issue affects Hermes versions prior to v0.12.0. Era posible desencadenar una condición de recursión infinita en el administrador de errores cuando Hermes ejecutaba un JavaScript específico formado de forma maliciosa. Esta condición sólo era posible en el modo de desarrollo (cuando... • https://www.facebook.com/security/advisories/cve-2022-27810 • CWE-674: Uncontrolled Recursion •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 3

23 Mar 2022 — Instagram iOS 106.0 and prior and Android 107.0.0.11 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages Instagram iOS para iOS versiones 106.0 y anteriores y para Android versiones 107.0.0.11 y versiones anteriores de interfaz de usuario, no representa apropiadamente los mensajes URI para el usuario, lo que resulta en una suplantación de URI por medio de mensajes especialmente diseñados RTLO injection URI spoofing gener... • https://packetstorm.news/files/id/166448 •

CVSS: 6.5EPSS: 4%CPEs: 2EXPL: 3

23 Mar 2022 — The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages. Facebook Messenger app para iOS versiones 227.0 y anteriores y Android versión 228.1.0.10.116 y la interfaz de usuario anterior, no representan apropiadamente los mensajes URI para el usuario, lo que resulta en una suplantación de URI por medio de mensajes especialmente diseñados RTLO injecti... • https://packetstorm.news/files/id/166448 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

15 Jan 2022 — By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0. Al pasar código javascript no válido en el que era llamado a await y yield sobre funciones getter/setter no asíncronas y no generadoras,... • https://www.facebook.com/security/advisories/cve-2021-24044 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Jan 2022 — The Mitsol Social Post Feed WordPress plugin before 1.11 does not escape some of its settings before outputting them back in attributes, which could allow high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed El plugin de WordPress Mitsol Social Post Feed antes de la versión 1.11 no escapa de algunas de sus configuraciones antes de devolverlas en atributos, lo que podría permitir a los usuarios con altos privilegios, como los admini... • https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

13 Dec 2021 — A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. Una vulnerabilidad de confusión de tipo podría ser desencadenada al resolver el operador unario "typeof" en Facebook Hermes versiones anteriores a v0.10.0. Tenga en cuenta que esto sólo es explotable si la aplicació... • https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 8.1EPSS: 1%CPEs: 7EXPL: 0

26 Oct 2021 — HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, al... • https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

10 Sep 2021 — parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for det... • https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 31%CPEs: 1EXPL: 3

10 Sep 2021 — Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0. Debido al uso de una lógica de deserialización de YAML no segura, un atacante con la capacidad de modificar los archivos de configuración YAML locales podría proporcionar una entrada maliciosa, resultando en una ejecución de código remota o riesgos similares. Este p... • https://packetstorm.news/files/id/164136 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 2%CPEs: 10EXPL: 0

23 Jul 2021 — Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1. Pasar un tamaño controlado por un atacante al crear un IOBuf podr... • https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •